메뉴 건너뛰기




Volumn 2887, Issue , 2003, Pages 170-181

New attacks against standardized MACs

Author keywords

[No Author keywords available]

Indexed keywords

LYAPUNOV METHODS; SECURITY OF DATA;

EID: 0242656060     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39887-5_13     Document Type: Article
Times cited : (9)

References (12)
  • 3
    • 0003372190 scopus 로고
    • The Security of the Cipher Block Chaining Message Authentication Code
    • Crypto '94, Springer-Verlag
    • M. Bellare, J. Kilian, and P. Rogaway. The Security of the Cipher Block Chaining Message Authentication Code. In Crypto '94, LNCS 839, pages 362-399. Springer-Verlag, 1994.
    • (1994) LNCS , vol.839 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 5
    • 84974603539 scopus 로고    scopus 로고
    • Key recovery and forgery attacks on the MacDES MAC algorithm
    • Crypto 2000, Springer-Verlag
    • D. Coppersmith, L.R. Knudsen, and C.J. Mitchell. Key recovery and forgery attacks on the MacDES MAC algorithm. In Crypto 2000, LNCS 1880, pages 184-196. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1880 , pp. 184-196
    • Coppersmith, D.1    Knudsen, L.R.2    Mitchell, C.J.3
  • 9
    • 0032047778 scopus 로고    scopus 로고
    • MacDES: MAC algorithm based on des
    • L.R. Knudsen and B. Preneel. MacDES: MAC algorithm based on DES. Electronic Letters, 34:871-873, 1998.
    • (1998) Electronic Letters , vol.34 , pp. 871-873
    • Knudsen, L.R.1    Preneel, B.2
  • 10
    • 0003928877 scopus 로고
    • may Federal Information Processing Standards PUBlication 113
    • NIST. Computer Data Authentication, may 1985. Federal Information Processing Standards PUBlication 113.
    • (1985) Computer Data Authentication
  • 12
    • 0032665874 scopus 로고    scopus 로고
    • On the security of iterated Message Authentication Codes
    • January
    • 12: B. Preneel and P.C. van Oorschot. On the security of iterated Message Authentication Codes. IEEE Transactions on Information Theory, 45(1):188-199, January 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.1 , pp. 188-199
    • Preneel, B.1    Van Oorschot, P.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.